Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Trellix Source Code Breach: Hackers Access Repository
May 2, 2026
Hackers Exploit cPanel Flaw to Breach Government Military
May 2, 2026
Exim Mail Server Vulnerabilities Lead to Crash via DNS Data
May 2, 2026
Home/Threats/ErrTraffic Breaks ClickFix Visually, Turning Attack to
Threats

ErrTraffic Breaks ClickFix Visually, Turning Attack to

GlitchFix, a new social engineering technique, has emerged, leveraging ErrTraffic—a specialized traffic distribution system. This method is designed to trick website visitors into downloading malware...

Sarah simpson
Sarah simpson
January 21, 2026 3 Min Read
0 0

GlitchFix, a new social engineering technique, has emerged, leveraging ErrTraffic—a specialized traffic distribution system. This method is designed to trick website visitors into downloading malware by presenting visually broken web pages.

The attack platform costs around $800 and offers cybercriminals a complete solution for running deceptive campaigns across multiple operating systems.

ErrTraffic extends the traditional ClickFix approach by deliberately breaking web pages using visual distortions and chaos effects, making users believe their browser or system requires an urgent update.

The platform targets Windows, macOS, Android, and Linux devices while supporting eight languages, enabling global campaigns.

Unlike basic phishing attacks, this system creates a convincing sense of urgency by scrambling page content with garbage characters, applying CSS distortions, and triggering mouse jitter effects—all while keeping the fake update prompt perfectly readable.

Censys analysts identified the threat infrastructure after discovering five physical servers running ErrTraffic panels across three autonomous systems, hosting eleven unique domains.

The researchers found two distinct versions operating simultaneously: version 2 with unobfuscated JavaScript and Russian-only admin interfaces, and version 3 featuring XOR-based payload obfuscation and an advanced ClickFix mode.

One misconfigured instance exposed the complete source code, providing detailed visibility into the operation.

The attack delivers remote monitoring and management tools disguised as legitimate browser or font updates, including FleetDeck, ITarian MDM, and ConnectWise Control.

These digitally signed tools are commonly allowlisted by security products, making detection challenging for traditional defenses.

Infection Mechanism and Attack Workflow

The ErrTraffic system operates through a multi-stage infection chain beginning when victims visit compromised websites containing injected script tags.

The malicious JavaScript loads from the ErrTraffic panel and immediately fingerprints the browser, operating system, and language settings.

Geographic filtering occurs next, using the ipwho.is API to block access from CIS countries including Russia, Ukraine, and Kazakhstan—a strong attribution indicator pointing to Russian-speaking threat actors.

The ErrTraffic v2 admin dashboard showing analytics, file management, and script configuration (Source - Censys)
The ErrTraffic v2 admin dashboard showing analytics, file management, and script configuration (Source – Censys)

If the victim passes geolocation and bot detection checks, the page enters chaos mode. Text transforms into unreadable Unicode characters while CSS transformations skew and rotate page layouts.

The system monitors dynamic content using MutationObserver APIs, ensuring newly loaded elements receive the same corruption treatment.

After a configurable delay, typically one second, a clean modal appears offering browser updates, font installations, or in version 3, PowerShell command execution.

Forum post listing ErrTraffic v2 for sale (Source - Censys)
Forum post listing ErrTraffic v2 for sale (Source – Censys)

When victims click the update button, the script requests a one-time download token from the panel server.

The token-based delivery system prevents researchers from directly accessing payloads without completing the full attack workflow.

After validation, the system serves operating system-specific RMM installers through hidden iframes, establishing persistent remote access.

Version 3’s ClickFix mode bypasses traditional download protections entirely by copying obfuscated PowerShell commands to clipboards, instructing users to manually execute terminal commands.

The ErrTraffic attack flow from initial visit to payload delivery (Source - Censys)
The ErrTraffic attack flow from initial visit to payload delivery (Source – Censys)

The platform’s evasion capabilities include bot detection patterns targeting security scanners, headless browsers, and automated tools.

Detection signatures rely on errtraffic_session cookies and specific API paths like /api/css.js.php for version 2 and /api/css.js for version 3.

The infrastructure uses cheap top-level domains and free subdomain services, with some panels impersonating government agencies like update211.security-ssa-gov.com.

Defenders should focus on network monitoring for errtraffic_session cookies, educating users about fake update prompts, and tracking unusual RMM tool installations.

The malware-as-a-service model includes subscription features with rental expiration fields, suggesting ongoing development and operator support beyond the initial $800 purchase price.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackMalwarephishingSecurityThreat

Share Article

Sarah simpson

Sarah simpson

Sarah is a cybersecurity journalist specializing in threat intelligence and malware analysis. With over 8 years of experience covering APT groups, zero-day exploits, and advanced persistent threats, Sarah brings deep technical expertise to breaking cybersecurity news. Previously, she worked as a security researcher at leading threat intelligence firms, where she analyzed malware samples and tracked cybercriminal operations. Sarah holds a Master's degree in Computer Science with a focus on cybersecurity and is a regular contributor to major security conferences.

Previous Post

PixelCode Attack: Malware Smuggled via Image Smuggles Encoding

Next Post

GitLab Vulnerabilities Allow 2FA Bypass & DoS Multiple Enables

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
cPanelSniper PoC Exploit for cPanel Vulner Disclosed Vulnerability
May 2, 2026
EtherRAT Targets Enterprise Admins with SEO Poison
May 1, 2026
New Spyware Platform: Rebrand & Resell Android Lets Buyers
May 1, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Emy Elsamnoudy
Emy Elsamnoudy
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us